Security Audit

Our Web Application Pentest ( WAP) attempts to address the Owasp top 10 & SANS top 20 web application vulnerabilities and other exploitable loopholes of your web application . Along with it our WAP team also test web applications for Business logic flaws that can directly or indirectly effect the functioning of application.

Trainings

We are here to help you solve your biggest query- where and how to start? CDI has brought various courses in Ethical Hacking in Chandigarh where all you technology lovers will be given the much needed push to move forward and create a niche for yourself in the field. From Beginner to Expert level we have many kinds of training patterns.

Certified Penetration testing Expert1 year Diploma is a ethical hacking training course provided by Cyber Defence Intelligence (CDI) in Punjab, Mohali ,Chandigarh, Haryana . This Ethical Hacking Course is provided by the professionals of CDI. It is framed by the expert professionals of CDI having hands-on experience in Cyber Security.

About Ethical Hacking Course

Full-fledged course designed by CDI covering all domains of hacking.

Framed in a manner such that it covers all aspects of Ethical Hacking.

Complete Ethical Hacking toolkit will be provided.

Along with the toolkit complete study material and guidance will be provided.

CDI is an emerging Information Security Company providing Information Security Solutions to clients. Key factors which play role that why CDI is best forEthical Hacking training are: Quality, affordability, regular exams, professional environment, guidance by experts, worth time utilization.

This ethical hacking course is designed keeping in mind hacker’s enthusiasm and hacking spirit. At the end of 3 months course, candidate will be provided with complete career assistance after clearing the final exam being conducted.

Course Detail: Overview of Topics

(1 Year Course ) - only content

Basics

● Introduction to Cyber Security

● Introduction to Cryptography and Hashes 2 Hours

● Ethical Hacking Introduction

● Introduction

● Introduction to all Underground Ethical Hacking Community

● Basics of Linux

○ Linux architecture

○ Linux File directory architecture

○ Installation of Linux

○ Basic commands of linux and their usage

○ Description of files like passwd, shadow, sudoers, etc.

○ Virtual Machine Installation

○ Installation of Linux

○ Introduction to Kali Linux and its Tools

○ Introduction to Backtrack/Kali Operating System

○ Penetration Testing using Backtrack/Kali

○ The Bash Environment

○ Simple Bash Scripting

○ Finding your way around Backtrack

○ Backtrack Services

● Basic of networks

○ Important Protocols and their headers (In Depth)

■ TCP

■ UDP

■ IP

■ ICMP

○ Ports and their basic

○ Basics of Linux Services

○ IPV6 & IPV4

○ Basics of Networking

○ Information Gathering and Footprinting

○ Network Vulnerability Assessment - Part 1 2 Hours

○ Network Vulnerability Assessment - Part 2 2 Hours

○ WiFi Hacking and Security 2 Hours

○ Router Penetration Testing 2 Hours

○ Metasploit Framework - Part 1

○ Metasploit Framework - Part 2

○ Metasploit Framework - Part 3

○ Network Exploitation Frameworks

○ Network Scanning VA Tools

○ Network IDS IPS Implementation

○ Penetration Testing Report Generartion

● Network Security

○ Important Protocols and their headers (In Depth)

○ Network Traffic Analysis

○ Network Threats and Attack Methodology

○ Reconnaissance (Basic and Advance)

○ Information gathering tools

○ Hashing (Cryptographic functions)

○ Port scanning via NMAP

○ Pentesting Methodology

○ Metasploit Framework

○ Manual Port Scanning

○ Scapy (MODIFY IP,PACKET HEADER , PARAMETERS , be fool the server)

○ Hping (Automatic packet generation tool)

○ Server pentesting

○ Hacking networks

○ VAPT

○ Secure network design

○ IDS & IPS

○ Rules of IDS & IPS

○ RFI & LFI

○ Denial of service (DOS) and distributed Denial of service (DDOS) attacks over the network.